Talk:Bluetooth/Archive 2017

External links modified
Hello fellow Wikipedians,

I have just modified 7 external links on Bluetooth. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
 * Corrected formatting/usage for http://www.hoovers.com/business-information/--pageid__13751--/global-hoov-index.xhtml
 * Corrected formatting/usage for http://www.lesswire.com/en/products/embedded-wireless-modules/bluetooth/bluebear/overview/
 * Corrected formatting/usage for http://www.europe.htc.com/z/pdf/products/1766_TyTN_LFLT_OUT.PDF
 * Added archive https://web.archive.org/web/20020426095418/http://www.wimedia.org/ to http://www.wimedia.org/
 * Corrected formatting/usage for http://www.wimedia.org/imwp/download.asp?ContentID=15506
 * Corrected formatting/usage for http://www.eng.tau.ac.il/~shakedy
 * Corrected formatting/usage for http://www.ursi.org/Proceedings/ProcGA05/pdf/K03.7%2801682%29.pdf

When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.

Cheers.— InternetArchiveBot  (Report bug) 08:08, 22 July 2017 (UTC)

Blueborne attack
According to a new report, roughly 5.3 billion of the 8.2 billion Bluetooth connected devices on the planet are vulnerable to a new exploit. Nearly every connected device on earth features Bluetooth and now over half of them are at risk from BlueBorne, a new zero-day exploit. BlueBorne targets vulnerable devices and spreads without the action or knowledge of the user. It’s being compared to the nasty WannaCry ransomware that spread around the globe earlier this year.

Here’s how it works: BlueBorne infects your device silently. Without any action on your part, it spreads to your device by taking advantage of how Bluetooth uses tethering to share data. It then acts as a trusted network and allows hackers to execute “man in the middle” attacks without you even knowing it. From there, it spreads to other vulnerable devices it detects. Researchers from Armis Labs who found the exploit were able to use it to create botnets and install ransomware.

Armis video: "Blueborne explained" Sept 12/17

Armis article: A new Bluetooth exploit leaves billions of devices vulnerable

Raymm (talk) 01:00, 13 September 2017 (UTC)

Protocol stack
The section about the protocol stack could probably be better organized by describing the protocols in a per-layer base (similar to OSI model and other articles on the usual Internet protocols), I believe. As it is the section is somewhat confusing, I believe. Since I don't have a very good understanding of this protocol stack in particular I don't think I'm able to do it myself. Saturnalia0 (talk) 21:04, 16 September 2017 (UTC)


 * Probably best to start with the main article, Bluetooth protocols, if anyone knows how. I only know below HCI William M. Connolley (talk) 21:23, 16 September 2017 (UTC)

over aggressive archiving
This talk page is getting archived too aggressively. And the yearly Archive link box is failing -- years past 2012 are not showing, so recent material is quite inaccessible.-73.61.15.208 (talk) 21:18, 21 December 2017 (UTC)

summary chart
Please add a summary chart of data rates.-73.61.15.208 (talk) 21:20, 21 December 2017 (UTC)